RSS   Podatności dla
'Zenworks configuration management'
   RSS

2020-01-25
 
CVE-2012-6345

NVD-CWE-noinfo
 

 
Novell ZENworks Configuration Management before 11.2.4 allows obtaining sensitive trace information.

 
 
CVE-2012-6344

CWE-79
 

 
Novell ZENworks Configuration Management before 11.2.4 allows XSS.

 
2017-08-09
 
CVE-2015-0786

 

 
Stack-based buffer overflow in the logging functionality in the Preboot Policy service in Novell ZENworks Configuration Management (ZCM) allows remote attackers to execute arbitrary code via unspecified vectors.

 
 
CVE-2015-0785

 

 
com.novell.zenworks.inventory.rtr.actionclasses.wcreports in Novell ZENworks Configuration Management (ZCM) allows remote attackers to read arbitrary folders via the dirname variable.

 
 
CVE-2015-0784

 

 
Rtrlet.class in Novell ZENworks Configuration Management (ZCM) allows remote attackers to obtain Session IDs of logged in users via a value of ShowLogins for the maintenance variable.

 
 
CVE-2015-0783

 

 
The FileViewer class in Novell ZENworks Configuration Management (ZCM) allows remote authenticated users to read arbitrary files via the filename variable.

 
 
CVE-2015-0782

 

 
SQL injection vulnerability in the ScheduleQuery method of the schedule class in Novell ZENworks Configuration Management (ZCM) allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

 
 
CVE-2015-0781

 

 
Directory traversal vulnerability in the doPost method of the Rtrlet class in Novell ZENworks Configuration Management (ZCM) allows remote attackers to upload and execute arbitrary files via unspecified vectors.

 
 
CVE-2015-0780

 

 
SQL injection vulnerability in the GetReRequestData method of the GetStoredResult class in Novell ZENworks Configuration Management (ZCM) allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

 
2016-02-18
 
CVE-2015-5970

 

 
The ChangePassword RPC method in Novell ZENworks Configuration Management (ZCM) 11.3 and 11.4 allows remote attackers to conduct XPath injection attacks, and read arbitrary text files, via a malformed query involving a system entity reference.

 


Copyright 2024, cxsecurity.com

 

Back to Top